Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:08

General

  • Target

    1f824bf7c73eeef309d3a30fff4e924f91870de0fc5990adc2d0a1a42284f567.exe

  • Size

    1.6MB

  • MD5

    2c4dbe075f37719580a096bf67bf048e

  • SHA1

    71673f7af94683985e875f3db73cbf1a5509228e

  • SHA256

    1f824bf7c73eeef309d3a30fff4e924f91870de0fc5990adc2d0a1a42284f567

  • SHA512

    6d5bed3e46aa8e02d678c0a3f1ff6be56b776980af341e9ef84d9febaad843dfa2df28083ff6d8dcad9e74d4724ee1f09190b093c9bb3d1cb78068ca219d3c70

  • SSDEEP

    24576:6sm8JijftfWIqZpyh/X6bSmV2GKz1oncoiF9GFwUvpHk3tSfEybcswrJ4gOEGEk:6D8Jijt+xpS/ekYmLGdhEAf7bCcjE

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 57 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 20 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Drops file in Program Files directory 30 IoCs
  • Drops file in Windows directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 12 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 57 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f824bf7c73eeef309d3a30fff4e924f91870de0fc5990adc2d0a1a42284f567.exe
    "C:\Users\Admin\AppData\Local\Temp\1f824bf7c73eeef309d3a30fff4e924f91870de0fc5990adc2d0a1a42284f567.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1f824bf7c73eeef309d3a30fff4e924f91870de0fc5990adc2d0a1a42284f567.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:6140
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Logs\csrss.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5392
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\csrss.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4864
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\edge_BITS_4736_124933937\RuntimeBroker.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4948
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\2f3e0199fccb3f72e8a39924edc6a781\fontdrvhost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4820
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Recent\smss.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5920
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Office\root\Licenses16\winlogon.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5036
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\34c553de294c1d56d0a800105b\csrss.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4628
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\2f3e0199fccb3f72e8a39924edc6a781\RuntimeBroker.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4124
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\fontdrvhost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:428
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Security\SppExtComObj.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3632
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\services.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4976
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\34c553de294c1d56d0a800105b\RuntimeBroker.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5756
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Media Player\en-US\fontdrvhost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4980
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\es-ES\OfficeClickToRun.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3592
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\34c553de294c1d56d0a800105b\dwm.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2036
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\2f3e0199fccb3f72e8a39924edc6a781\1f824bf7c73eeef309d3a30fff4e924f91870de0fc5990adc2d0a1a42284f567.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2976
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ServiceProfiles\LocalService\Desktop\TextInputHost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:876
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Crashpad\attachments\dllhost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3916
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\34c553de294c1d56d0a800105b\Registry.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4144
    • C:\Windows\Logs\csrss.exe
      "C:\Windows\Logs\csrss.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:6020
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ba4e8b52-3e59-4930-b883-b2179e1df5fb.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5824
        • C:\Windows\Logs\csrss.exe
          C:\Windows\Logs\csrss.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5420
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5d8b4128-5178-4823-b1df-18a21b75e57b.vbs"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:5984
            • C:\Windows\Logs\csrss.exe
              C:\Windows\Logs\csrss.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2436
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fc1575b9-f3da-4ef6-9b05-54f7071ba6a6.vbs"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:6032
                • C:\Windows\Logs\csrss.exe
                  C:\Windows\Logs\csrss.exe
                  8⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4576
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3a6e6bdb-cf88-4747-b696-502100c7ad6e.vbs"
                    9⤵
                      PID:2220
                      • C:\Windows\Logs\csrss.exe
                        C:\Windows\Logs\csrss.exe
                        10⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2372
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a203b072-4809-439e-bc6b-3cc569b1e1a3.vbs"
                          11⤵
                            PID:788
                            • C:\Windows\Logs\csrss.exe
                              C:\Windows\Logs\csrss.exe
                              12⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Modifies registry class
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4880
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b2974d27-c5b1-425a-bcf9-c52b0e7db202.vbs"
                                13⤵
                                  PID:4820
                                  • C:\Windows\Logs\csrss.exe
                                    C:\Windows\Logs\csrss.exe
                                    14⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2036
                                    • C:\Windows\System32\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c0e540fa-813c-4656-84c8-261a2addeff7.vbs"
                                      15⤵
                                        PID:4424
                                        • C:\Windows\Logs\csrss.exe
                                          C:\Windows\Logs\csrss.exe
                                          16⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Modifies registry class
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4928
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c9f1ffec-4430-4e45-9cd3-920553531b08.vbs"
                                            17⤵
                                              PID:5644
                                              • C:\Windows\Logs\csrss.exe
                                                C:\Windows\Logs\csrss.exe
                                                18⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1648
                                                • C:\Windows\System32\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\85070111-ce02-42a4-8717-8e63d08f83f1.vbs"
                                                  19⤵
                                                    PID:3132
                                                    • C:\Windows\Logs\csrss.exe
                                                      C:\Windows\Logs\csrss.exe
                                                      20⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5652
                                                      • C:\Windows\System32\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2de0eda8-88bd-444b-8d98-b0c8f70b00a1.vbs"
                                                        21⤵
                                                          PID:1036
                                                          • C:\Windows\Logs\csrss.exe
                                                            C:\Windows\Logs\csrss.exe
                                                            22⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Modifies registry class
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:3488
                                                            • C:\Windows\System32\WScript.exe
                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b996a933-01b8-45de-83ac-45f37d48fe04.vbs"
                                                              23⤵
                                                                PID:2168
                                                              • C:\Windows\System32\WScript.exe
                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2be19ef4-c87b-4a08-9fc8-07f06e35ca52.vbs"
                                                                23⤵
                                                                  PID:4192
                                                            • C:\Windows\System32\WScript.exe
                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2da67b04-125a-4f7f-8b68-f9c306723354.vbs"
                                                              21⤵
                                                                PID:2460
                                                          • C:\Windows\System32\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6f37bb55-093a-4391-b424-0e02477b518b.vbs"
                                                            19⤵
                                                              PID:1720
                                                        • C:\Windows\System32\WScript.exe
                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8017954e-a23c-4784-97c1-3ff3e03ed184.vbs"
                                                          17⤵
                                                            PID:5212
                                                      • C:\Windows\System32\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1c3679c2-562c-4149-a003-1f72cb0be0a6.vbs"
                                                        15⤵
                                                          PID:5588
                                                    • C:\Windows\System32\WScript.exe
                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9eb93079-9aeb-498a-87fc-270b5217d161.vbs"
                                                      13⤵
                                                        PID:3480
                                                  • C:\Windows\System32\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d01278d3-aef5-440a-b504-66a834f282a1.vbs"
                                                    11⤵
                                                      PID:5520
                                                • C:\Windows\System32\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f392391f-b54e-45a6-989d-845d99922433.vbs"
                                                  9⤵
                                                    PID:2520
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4852eae5-41c5-4e77-8a28-04c38c5f312e.vbs"
                                                7⤵
                                                  PID:3932
                                            • C:\Windows\System32\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\485a0874-fb7e-4015-90e8-f90c00c4a93f.vbs"
                                              5⤵
                                                PID:852
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d56be303-84a0-4915-9fa0-13c7b57d1c3d.vbs"
                                            3⤵
                                              PID:4204
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Windows\Logs\csrss.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:5036
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Logs\csrss.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4628
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Windows\Logs\csrss.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:428
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4972
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4980
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:876
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files\edge_BITS_4736_124933937\RuntimeBroker.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2956
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\edge_BITS_4736_124933937\RuntimeBroker.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4128
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Program Files\edge_BITS_4736_124933937\RuntimeBroker.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:5412
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\2f3e0199fccb3f72e8a39924edc6a781\fontdrvhost.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2836
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\2f3e0199fccb3f72e8a39924edc6a781\fontdrvhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2684
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\2f3e0199fccb3f72e8a39924edc6a781\fontdrvhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4032
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Recent\smss.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:5620
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Default\Recent\smss.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4140
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Recent\smss.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3292
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Office\root\Licenses16\winlogon.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3952
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\root\Licenses16\winlogon.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1520
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office\root\Licenses16\winlogon.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:5976
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\34c553de294c1d56d0a800105b\csrss.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1988
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\34c553de294c1d56d0a800105b\csrss.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3388
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\34c553de294c1d56d0a800105b\csrss.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2044
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\2f3e0199fccb3f72e8a39924edc6a781\RuntimeBroker.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:5800
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\2f3e0199fccb3f72e8a39924edc6a781\RuntimeBroker.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2396
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\2f3e0199fccb3f72e8a39924edc6a781\RuntimeBroker.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:920
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Windows\Microsoft.NET\fontdrvhost.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1556
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\Microsoft.NET\fontdrvhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2052
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Windows\Microsoft.NET\fontdrvhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:5960
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Security\SppExtComObj.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4916
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files\Windows Security\SppExtComObj.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:624
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Security\SppExtComObj.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:440
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\services.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:5524
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\services.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1020
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\services.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1088
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\34c553de294c1d56d0a800105b\RuntimeBroker.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3828
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\34c553de294c1d56d0a800105b\RuntimeBroker.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2808
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\34c553de294c1d56d0a800105b\RuntimeBroker.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1440
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Media Player\en-US\fontdrvhost.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:5192
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\en-US\fontdrvhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1264
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Media Player\en-US\fontdrvhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3064
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 13 /tr "'C:\Windows\es-ES\OfficeClickToRun.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1084
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\es-ES\OfficeClickToRun.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:5856
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Windows\es-ES\OfficeClickToRun.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1096
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\34c553de294c1d56d0a800105b\dwm.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:5384
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\34c553de294c1d56d0a800105b\dwm.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3512
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\34c553de294c1d56d0a800105b\dwm.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3860
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "1f824bf7c73eeef309d3a30fff4e924f91870de0fc5990adc2d0a1a42284f5671" /sc MINUTE /mo 7 /tr "'C:\2f3e0199fccb3f72e8a39924edc6a781\1f824bf7c73eeef309d3a30fff4e924f91870de0fc5990adc2d0a1a42284f567.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1664
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "1f824bf7c73eeef309d3a30fff4e924f91870de0fc5990adc2d0a1a42284f567" /sc ONLOGON /tr "'C:\2f3e0199fccb3f72e8a39924edc6a781\1f824bf7c73eeef309d3a30fff4e924f91870de0fc5990adc2d0a1a42284f567.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4552
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "1f824bf7c73eeef309d3a30fff4e924f91870de0fc5990adc2d0a1a42284f5671" /sc MINUTE /mo 11 /tr "'C:\2f3e0199fccb3f72e8a39924edc6a781\1f824bf7c73eeef309d3a30fff4e924f91870de0fc5990adc2d0a1a42284f567.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4340
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 8 /tr "'C:\Windows\ServiceProfiles\LocalService\Desktop\TextInputHost.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:816
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\ServiceProfiles\LocalService\Desktop\TextInputHost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2852
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Windows\ServiceProfiles\LocalService\Desktop\TextInputHost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1444
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files\Crashpad\attachments\dllhost.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:6032
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Crashpad\attachments\dllhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:5516
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Program Files\Crashpad\attachments\dllhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2784
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\34c553de294c1d56d0a800105b\Registry.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3092
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\34c553de294c1d56d0a800105b\Registry.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2968
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 13 /tr "'C:\34c553de294c1d56d0a800105b\Registry.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2316

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\2f3e0199fccb3f72e8a39924edc6a781\fontdrvhost.exe

                                          Filesize

                                          1.6MB

                                          MD5

                                          8da1ce536b31103cd8a4ce9bd0e7fbb1

                                          SHA1

                                          cafa832cf493e96a2cbf9b15fc1df8f348d3e871

                                          SHA256

                                          d8b6a6147a9df948d1806920a3c39da9cb0a4a4eb2b0ccf31a86491a5fa4ed0a

                                          SHA512

                                          2a422edb53fe3a1ec2be0b508581dd5dbf1c8a1eded0c5ed24d7420139a5774e7d8fd6a02b016348be93efddd7c7750d48a9c52badb3d1c772948d562fd9b120

                                        • C:\34c553de294c1d56d0a800105b\RCXADBB.tmp

                                          Filesize

                                          1.6MB

                                          MD5

                                          39f8ca0c3eaaa96a810ebcb8967df185

                                          SHA1

                                          fe5afd577964877eccbde2abaf213af3464c5a11

                                          SHA256

                                          3795bd4beaeb3c360c45e028f736e5f6d084439d63a921ec02e9f292641736f6

                                          SHA512

                                          5b7169092d43fb6470454c730f81df4efadc80ac35c8b125d846794a659e708dfce1781f79211a320e52c9dd4c8954beea37e48a9daf438e1254ef51377a99c2

                                        • C:\Program Files\Windows Security\SppExtComObj.exe

                                          Filesize

                                          1.6MB

                                          MD5

                                          e743914babc5abd64c3f7d027b6a5028

                                          SHA1

                                          79ea497e5960af24a69f93dfbb11b88deceea18f

                                          SHA256

                                          bf3fd76a5e898d54bb4f41299436d9fde10595cae11ee0be0eec0c048f8e906c

                                          SHA512

                                          9fd29fd31b6fda9a80333da8b38d5fc2484985f46153401a53254676775652835906d6651d0fbb5863ea2e8b728827cefdeaddd23e3a6711788fe3d0f7695bfb

                                        • C:\Recovery\WindowsRE\csrss.exe

                                          Filesize

                                          1.6MB

                                          MD5

                                          c599e0f8eb9f585434f3954860aa47f5

                                          SHA1

                                          9baccff3f40b40a21f67eaab8f0536c6e4adaa7d

                                          SHA256

                                          184384d69eb0a5ed0789d35de93a3853cd7f414168af8f03a4972712fcd6a902

                                          SHA512

                                          dceb4acecca4717df808345b68aedbda613046a007c94d5e702552d914cb04073aa87a09e06c12816aa1cac23c91990f42f4b4cb070d7275e40e1832ed87ec76

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\csrss.exe.log

                                          Filesize

                                          1KB

                                          MD5

                                          3690a1c3b695227a38625dcf27bd6dac

                                          SHA1

                                          c2ed91e98b120681182904fa2c7cd504e5c4b2f5

                                          SHA256

                                          2ca8df156dba033c5b3ae4009e3be14dcdc6b9be53588055efd0864a1ab8ff73

                                          SHA512

                                          15ebfe05c0317f844e957ac02842a60b01f00ddca981e888e547056d0e30c97829bc4a2a46ce43034b3346f7cf5406c7c41c2a830f0abc47c8d2fd2ef00cb2c1

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                          Filesize

                                          2KB

                                          MD5

                                          d85ba6ff808d9e5444a4b369f5bc2730

                                          SHA1

                                          31aa9d96590fff6981b315e0b391b575e4c0804a

                                          SHA256

                                          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                          SHA512

                                          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          944B

                                          MD5

                                          3daae9cdd018437ea3c21aba22ed09c6

                                          SHA1

                                          9f0127b1483e1937d5d8cccf3ae1de0cac1c4c58

                                          SHA256

                                          10ae5cee35e47503d6db91713d92e11babdbb6c06f309fc761dccc7d9684723a

                                          SHA512

                                          17b4b1aa30c7871f7325f67b1b3ab5cd6f6eaafd7e4b45e96beb7fb84f80d0c4858852dbb15c1dfa2abf3e2aa6507c85e041807a575f29fe0c5dc215b04a206a

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          944B

                                          MD5

                                          9ea4fdbf8bad883929456091a1e50194

                                          SHA1

                                          fc3b6026729ad36729c2cc4349b8e7a94255ad71

                                          SHA256

                                          ca2f5b4e41b386c2f09fb10d2cf78cd395b614ea6c7c11ec155b415550262e2e

                                          SHA512

                                          27bdd15bf73b9fe22005834e083c1e05919532a4f3eb4c4c41727f8175f35ab2119625ee7d8cc0ab86e00631393c8c839f05dcd3cdcd6644b83de41649472211

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          944B

                                          MD5

                                          57a97b6c8c4cecbbaca70e7453397c5e

                                          SHA1

                                          89aaaa12386a9b191b7570c942b6c302bce1b218

                                          SHA256

                                          61104d386ede610e31af0f4532e78f309a907a100b7de7f6bd362ba758b1372f

                                          SHA512

                                          0b475f771633930a90ccc9fcf3b823f7ba0aa8d1c1c984eed37d8844f01988740f1974c3536a690e033b7861018e1e25a46d8ef86abd5fa24db02e1f6a07ffa6

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          944B

                                          MD5

                                          4b25365534f6e80f784bf0e0d4059973

                                          SHA1

                                          c599ef0f1d9ba1265eeb3bb02db8ea30eebee19c

                                          SHA256

                                          ea3d1a91d3248163412b2df35c0fcafbdc2ad4754c82e202b8f3b142af2b760c

                                          SHA512

                                          96deef1eba434a1784105a51888ca0cedd460bf05743e91e06a2b3dfff690099a5c3aad8b15297d3f84a10d8ddc24cfafa622217139ac1356fe40f18fd410c5e

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          944B

                                          MD5

                                          e912b11f067dfdc49fa5eec88bfb74dd

                                          SHA1

                                          9eb1e129867c685d0c6c3ca18e677a6da2eb3c0d

                                          SHA256

                                          16b497f7b55339f9dbed02d0c4a7eccd490335a253cf41ebb611e7867c35f4a5

                                          SHA512

                                          b2e3bdd21857af9d568b7a87c088f6ab07eac8366fbeaaa27c6bebed7e90eaa024214cfb29d1f1379ad806bb63c06b61bd7c9c4ea53636d78914ae47c09950d5

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          944B

                                          MD5

                                          af1324e7a4e3e6cfc7ee7add0391f0b9

                                          SHA1

                                          19117163248a95e5ceb83b6dc8c21e396f33bcaf

                                          SHA256

                                          a31abfc5cc0132c488495c81046d7f3c7eed1e7a6923d94ffd85b58436871a52

                                          SHA512

                                          6a05a892ec41527782b418a2f232300da84eff105b2d9c1cb55c7e9ce1ef13beab2d57b4bf3cc73d1e5b2710010f3622500c4d8e0cb2fa8e5365b6ff007e9d00

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          944B

                                          MD5

                                          1b2770b6e93963548483b9857a191b12

                                          SHA1

                                          da1f36e92f6f116ea4d6300b279be899ed6413a8

                                          SHA256

                                          4c2f150efa24585d81d212c3d1618af0777e007596cf7bd76cbf660db384b00b

                                          SHA512

                                          6fe8388503b09ec12528e982fea548c271d5687163db05ede832a0814a0fad6fa7c4ff32ed0cfa48f90c9b2980e2613be1d673fa47eaa2a9ea9540add473b4ea

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          944B

                                          MD5

                                          afc798b866b5e59eed81ed1ae790ab89

                                          SHA1

                                          f0198f123b8c2b4428e95f4eb1af52043f1a27ad

                                          SHA256

                                          4252f8b41ce5a5d808e0c8418440c8432b7075025fd3bf8e16cc1fc7697000f4

                                          SHA512

                                          463266fcb03789158528abcee746f35e8069e1f03dad6ab3d8aa30cd31c2c1c110cbb79ae44ef922b6a1765855ea7e5e4aa2a1d449e9d9e96c9f85d224b74e5e

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          944B

                                          MD5

                                          c926b492b1d39d04f6e9656ec7f5877d

                                          SHA1

                                          c2cb3c49c5aa9b0616a7ddb11c9a1453855b352a

                                          SHA256

                                          b0beda1f817ee65a341d4792f15dbd70be363835d7ebc3af6302b771295bc907

                                          SHA512

                                          df815fe9c34f85a90c3692534993955ca3c6f57a317f46bd9366152993c5918cd6f376678f9957ae43317bb7f1f5ba65ae175dce8f5e9735749263214e1fe74e

                                        • C:\Users\Admin\AppData\Local\Temp\2de0eda8-88bd-444b-8d98-b0c8f70b00a1.vbs

                                          Filesize

                                          701B

                                          MD5

                                          363d961234b4d1a40cc69267ed627b20

                                          SHA1

                                          9a6c0efa3a662be65cd8d637a8d18a49cc3c53c3

                                          SHA256

                                          0a29bed4dbf30f3efefca5e6a96d50ff25c6597a8b71a477bc1678ceedfd926a

                                          SHA512

                                          c45068e2214863257b05db4e997c136d9322552fe02abafa083dfffc1c630e130e3d9052bb6782d913a66cadb36779d3d77d2c93b815dfe172ae1a58deac30fa

                                        • C:\Users\Admin\AppData\Local\Temp\3a6e6bdb-cf88-4747-b696-502100c7ad6e.vbs

                                          Filesize

                                          701B

                                          MD5

                                          981df394b4c86460abbe80f843e7156a

                                          SHA1

                                          de24a903a455ac0da76b88c7a87522f82437b7ef

                                          SHA256

                                          fa1c75c3c2d1aeb18a5042c0b1cea6c5e4e368642391fdcc70510efb71855eb8

                                          SHA512

                                          55d653a8ed30e55bdfadeec40d80484b9ef563cee587bb9e2185e597fd3a98eb1d916476eceed1649ecfee0d6d4070a701037b511c4dfd28060b3142ff3650e7

                                        • C:\Users\Admin\AppData\Local\Temp\5d8b4128-5178-4823-b1df-18a21b75e57b.vbs

                                          Filesize

                                          701B

                                          MD5

                                          abb7c05a03e6616029f89045de97e921

                                          SHA1

                                          e5905131484b1e94ca0709f20d044483dcc7f24d

                                          SHA256

                                          7408d8b490d4094d7c6946bb1aa0de4e71ca1fb0e339b3778654dfcddea3dab4

                                          SHA512

                                          c2252449886c9319651c071e70b56952792601afe1a301b791eb5b2374b33a3fd23cd9d8969ebf4bf93ca7242be27300f838e2de0ae44445affc1bffd4d72dc3

                                        • C:\Users\Admin\AppData\Local\Temp\85070111-ce02-42a4-8717-8e63d08f83f1.vbs

                                          Filesize

                                          701B

                                          MD5

                                          3684841b765f099a1b66d3bf292f2696

                                          SHA1

                                          ef4d05c1b5d659b0080819774e4f9cfcb4e7d14a

                                          SHA256

                                          13ffc7b8e2d0ff92921f60267b1bd485e19f4cebe242542bffc494d6e641bec1

                                          SHA512

                                          8ff3f6ebd39aaa2982adf8ae6d75f460b20645364e6cbb307b3f42d5fefac5747771eb8baa7d2d9bc396fb232c47d1a0cacd1b7af2a1fd8bd7bf0233217e9ff9

                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pt0nk10d.gz4.ps1

                                          Filesize

                                          60B

                                          MD5

                                          d17fe0a3f47be24a6453e9ef58c94641

                                          SHA1

                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                          SHA256

                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                          SHA512

                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                        • C:\Users\Admin\AppData\Local\Temp\a203b072-4809-439e-bc6b-3cc569b1e1a3.vbs

                                          Filesize

                                          701B

                                          MD5

                                          5dc1f4497c7f28bcaf57d4e7bedd38dc

                                          SHA1

                                          01cf744e6db450d6de3f6512665375766b5ee08a

                                          SHA256

                                          e6ecf07caf12a0ca5517c920219654b5664b6186807015882335c63b4333613a

                                          SHA512

                                          d68463efb054f288f574f9e67f4b71a5699a6b3c3df4bd3162e49d57cc73517523cd4d0386c012a3b7b1f85eec05861ba27d359ac10ac3a07b799fe71c2e6f68

                                        • C:\Users\Admin\AppData\Local\Temp\b2974d27-c5b1-425a-bcf9-c52b0e7db202.vbs

                                          Filesize

                                          701B

                                          MD5

                                          b5d1f7ae3cb0c6b5a0db3ae966e38f41

                                          SHA1

                                          cbb2d2ca23d41ea31b5a8a3e260a9fec5e32234c

                                          SHA256

                                          41b4c0815f5680ccbbd4315d0060ccb967dc378b90370325680e5e6135d12911

                                          SHA512

                                          2598561b0bad65ba9060fcbd42f934cbded5992cf3606b04e96030c5d81bd8e3794d81f30d52c1a9ca02f944fa81babf7f74556c6f49e1877e6120c9cabeb2e3

                                        • C:\Users\Admin\AppData\Local\Temp\ba4e8b52-3e59-4930-b883-b2179e1df5fb.vbs

                                          Filesize

                                          701B

                                          MD5

                                          9880f4b84928f6e9de1b0698b47677fc

                                          SHA1

                                          8e6dc3190eed11a8f67a4587ae810630cfc5e114

                                          SHA256

                                          642c97e25930816fa4131852dba5255bec026ed11acaa4c616f69dfee89b5041

                                          SHA512

                                          baca7a6de92fcb723a869940d2750c7a61aa8d4e836511dcd5fef9b9773694bd1c57758d287f6205ad53f5cc4228348f212484553f19bb2d85a321f89df7d8af

                                        • C:\Users\Admin\AppData\Local\Temp\c0e540fa-813c-4656-84c8-261a2addeff7.vbs

                                          Filesize

                                          701B

                                          MD5

                                          1cccaf2023d214a702073063dd767a2f

                                          SHA1

                                          41e13da7e36388c8a4d525f492541e97bd756460

                                          SHA256

                                          eb76b5d86bf515038742c96bdf3f0b132f37d9056f671428bf6e9c1b358870e6

                                          SHA512

                                          d845efdc61759b07543a4520831575d7f5af0b155f308be35aed3d44188506cedc2a1853ca001e5948d4b6f8bf459024710904a79a7f01529bfe343684c219a7

                                        • C:\Users\Admin\AppData\Local\Temp\c9f1ffec-4430-4e45-9cd3-920553531b08.vbs

                                          Filesize

                                          701B

                                          MD5

                                          fef3b62c7305694046a3c3c0997e1ccf

                                          SHA1

                                          de43da94e6fad66c33124181f08cfcd6ddc3ef6a

                                          SHA256

                                          d716145eb1d1b7d3e0903b5cc718b493bc37d3676fcc604ac5e550e5822ed894

                                          SHA512

                                          80dfb07a21204a2367ccf0aae5903d4cf3bcf0835e89fff619dd3076ea6d1b59ad9b0f4419a98dd4b496492eacd7cfa908c6eb85568ecabed71aee73d613fc39

                                        • C:\Users\Admin\AppData\Local\Temp\d56be303-84a0-4915-9fa0-13c7b57d1c3d.vbs

                                          Filesize

                                          477B

                                          MD5

                                          bce5ab47f64680674906374a31893791

                                          SHA1

                                          b2eb2083035fe30db571898d285bdeaefe57668c

                                          SHA256

                                          c333d55a3be83d82bbf9724dc8682260be6bff30644a6b5053163a0c08e902b4

                                          SHA512

                                          838d614505b713835df5a6b6c0b4d1e075494d939bccdb54774401bca0cfc0463f0c5dab0a28e89a67ffe2d725bd42e06b496bfb6eb6fd7e721c86a4715846b4

                                        • C:\Users\Admin\AppData\Local\Temp\fc1575b9-f3da-4ef6-9b05-54f7071ba6a6.vbs

                                          Filesize

                                          701B

                                          MD5

                                          f0e934b3ab42a17b9b491729db2a7089

                                          SHA1

                                          6cc4fbc0e2ee6d30cfd2ce9cf3f900712a599648

                                          SHA256

                                          0fb8050e3a36f49dfa0312767ff8ee006b24e4d5a9913d43da9d4a248d38e6f9

                                          SHA512

                                          52fbb36136c0bead6858fd301f32cc497710e98c3362f98ba57f305968aca0e60fc99e20f81f5456e5c827819fe701fe14607444d7685b113ed305c49d3fe71b

                                        • C:\Users\Default\AppData\Roaming\Microsoft\Windows\Recent\smss.exe

                                          Filesize

                                          1.6MB

                                          MD5

                                          2c4dbe075f37719580a096bf67bf048e

                                          SHA1

                                          71673f7af94683985e875f3db73cbf1a5509228e

                                          SHA256

                                          1f824bf7c73eeef309d3a30fff4e924f91870de0fc5990adc2d0a1a42284f567

                                          SHA512

                                          6d5bed3e46aa8e02d678c0a3f1ff6be56b776980af341e9ef84d9febaad843dfa2df28083ff6d8dcad9e74d4724ee1f09190b093c9bb3d1cb78068ca219d3c70

                                        • memory/4560-10-0x000000001BCE0000-0x000000001BCEC000-memory.dmp

                                          Filesize

                                          48KB

                                        • memory/4560-15-0x000000001BEE0000-0x000000001BEE8000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/4560-13-0x000000001BEC0000-0x000000001BECE000-memory.dmp

                                          Filesize

                                          56KB

                                        • memory/4560-12-0x000000001BEB0000-0x000000001BEBA000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/4560-11-0x000000001BEA0000-0x000000001BEAC000-memory.dmp

                                          Filesize

                                          48KB

                                        • memory/4560-9-0x000000001B660000-0x000000001B668000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/4560-16-0x000000001BEF0000-0x000000001BEFA000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/4560-8-0x000000001B670000-0x000000001B680000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/4560-6-0x000000001B630000-0x000000001B646000-memory.dmp

                                          Filesize

                                          88KB

                                        • memory/4560-7-0x000000001B650000-0x000000001B658000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/4560-524-0x00007FFD2FF00000-0x00007FFD309C1000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4560-1-0x0000000000850000-0x00000000009F2000-memory.dmp

                                          Filesize

                                          1.6MB

                                        • memory/4560-5-0x000000001B620000-0x000000001B630000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/4560-4-0x000000001BC90000-0x000000001BCE0000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/4560-0-0x00007FFD2FF03000-0x00007FFD2FF05000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/4560-3-0x0000000002AE0000-0x0000000002AFC000-memory.dmp

                                          Filesize

                                          112KB

                                        • memory/4560-14-0x000000001BED0000-0x000000001BED8000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/4560-225-0x00007FFD2FF00000-0x00007FFD309C1000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4560-200-0x00007FFD2FF03000-0x00007FFD2FF05000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/4560-17-0x000000001BF00000-0x000000001BF0C000-memory.dmp

                                          Filesize

                                          48KB

                                        • memory/4560-2-0x00007FFD2FF00000-0x00007FFD309C1000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/5920-337-0x0000016C1BCB0000-0x0000016C1BCD2000-memory.dmp

                                          Filesize

                                          136KB